skip to Main Content

Information Governance and Data Security - Further Information

This page shows up to 100 pieces of content (newest at the top):

DISCOVERING SENSITIVE DATA MarketUpdate (cover thumbnail)

Discovering Sensitive Data (2020)

This Market Update discusses, reviews and compares products specialising in the discovery of sensitive data.
AB INITIO InBrief (SENSITIVE DATA) cover thumbnail

Ab Initio Semantic Discovery

Ab Initio Semantic Discovery is a data discovery solution offered as part of Ab Initio’s broader data management platform.
00002549 - HITACHI LUMADA InBrief cover thumbnail

Lumada Data Catalog

The Lumada Data Catalog from Hitachi Vantara is a data catalogue targeted at both the enterprise data lake and traditional data environments.
SEEKER InBrief (SENSITIVE DATA) cover thumbnail

Seeker DLP

Seeker DLP finds sensitive data within files on Windows and Macs, across SMB-based file servers and web servers.
STEALTHBITS InBrief (SENSITIVE DATA) cover thumbnail

STEALTHbits Sensitive Data Discovery

STEALTHbits supports discovery against a comprehensive list of file systems, SharePoint and OneDrive, Exchange, Dropbox, Oracle and Microsoft SQL Server.
DATA SUNRISE InBrief (SENSITIVE DATA) cover thumbnail

DataSunrise Sensitive Data Discovery

DataSunrise supports the discovery of sensitive data across a wide range of both relational and NoSQL data sources.
SOLIX InBrief (SENSITIVE DATA) cover thumbnail

Solix Technologies Sensitive Data Discovery

Solix Common Data Platform acts as a one stop shop for the management and governance of all enterprise data.
DATAGUISE InBrief (SENSITIVE DATA) cover thumbnail

Dataguise DgSecure

Dataguise started by offering sensitive data discovery and masking but now includes, additionally, encryption/decryption and extensive reporting.
MENTIS InBrief (SENSITIVE DATA) cover thumbnail

MENTIS iDiscover

MENTIS iDiscover offers a range of modules that cover all necessary functions for discovering, protecting and monitoring sensitive data.
BIG ID InBrief (SENSITIVE DATA) cover thumbnail

BigID

BigID specialises in (sensitive) data discovery and classification and unlike other vendors has been built from the ground up to concentrate in this area.
GROUND LABS InBrief (SENSITIVE DATA) cover thumbnail

Ground Labs Enterprise Recon (2020)

Enterprise Recon offers enterprise-wide discovery of personal, PII and PCI data in accordance with a wide range of compliance regulations.
Informatica Data Privacy Management InBrief (SENSITIVE DATA) cover thumbnail

Informatica Data Privacy Management (2020)

Informatica Data Privacy Management is a datacentric privacy, governance and security solution that is focused on discovering and classifying sensitive data.
GLOBAL IDs InBrief (SENSITIVE DATA) cover thumbnail

Global IDs Sensitive Data Discovery (2020)

Global IDs offers data discovery and classification as part of its EDA platform, thereby providing sensitive data discovery and compliance with regulations.
00002711 - DATA ASSURANCE Hyper Report (cover thumbnail)

Data Assurance

This report is about assuring the quality and provenance of your data from both internal and external perspectives.
00002492 - GDPR COMPLIANCE InContext cover thumbnail

GDPR Compliance

GDPR is now a reality and sanctions are starting to bite. What should organisations be doing?
Cover for GRC realities - what are organisations really doing?

GRC realities - what are organisations really doing?

Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.
Cover for Driving into the future with connected cars

Driving into the future with connected cars - PKI technology helps assuage the security concerns of increased connectivity

PKI technology provides a viable alternative for vastly improving security within today’s increasingly connected cars and the ecosystem in which they operate.
Cover for The Chief Data Officer: getting the basics right

The Chief Data Officer: getting the basics right

Before a CDO can think sensibly about what data the business might want to leverage they must get a handle on the data assets that the company already possesses.
Cover for The importance of a data protection platform for GDPR compliance

The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance

This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
Cover for How to raise your organisation's security maturity level

How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern

This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
Cover for Practices for Enhancing Data Security

Practices for Enhancing Data Security - a survey of organisations in the UK and the US

This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
Cover for Financial Services Directives

Financial Services Directives - Requirements for Data Technologies

The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
Cover for Document Content Security V2

Document Content Security V2

Preventing malicious documents from traversing networks will help considerably in preventing security breaches.
Cover for Good information governance is good business practice

Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance

This document discusses how technology enables more effective business collaboration and communications...
Cover for Managing Cyber Business Risk

Managing Cyber Business Risk - with Content Assurance and Cyber Insurance

Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Cover for Taking control of file sharing services

Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations

Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
Cover for Document Content Security

Document Content Security

Documents are key weapons used in advanced targeted attacks, which are fast growing in popularity among criminals.
Cover for The need to protect against file-based attacks

The need to protect against file-based attacks - statistical evidence for the need for greater assurance

The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Cover for Content assurance and advanced threat protection for valuable business documents

Content assurance and advanced threat protection for valuable business documents - assuring the safety and integrity of files and documents

This document aims to highlight the security risks associated with documents and to show why taking such threats seriously is vital for the success of any organisation.
post (Icon)

Blended security threats require a unified response

The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec...
Cover for Key considerations for security intelligence in big data

Key considerations for security intelligence in big data - what a CISO needs to know

This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Cover for Harnessing big data for security

Harnessing big data for security - what are the key considerations and capabilities?

This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
post (Icon)

Big Data bias - An analysis of recent research from Varonis

Varonis has published some research into big data - but just looking at the press release is misleading
Cover for Voice Data Security

Voice Data Security

Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.
Cover for Voice Data Security

Voice Data Security - An overview of cellular (mobile) phone interception

Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.
Cover for Efforts to improve data security in the local government sector

Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings

Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.
Cover for Real Evidential Weight

Real Evidential Weight

This white paper discusses data storage in the organisation and it's effective management to meet legislation and compliance.
Cover for Managing the Storage Explosion

Managing the Storage Explosion - through new technological approaches

A series of recently developed technologies will, to a greater or lesser degree, help in combating the effects of the storage explosion.
Cover for Practical Compliance

Practical Compliance

This paper describes a few situations organisations are encountering - or will encounter - to clarify some of the basic compliance data storage needs.
Cover for Open-Tec CStore Content Archive

Open-Tec CStore Content Archive

There are as yet no direct competitors in this niche, yet it addresses a growing requirement. CStore has major disruptive market potential.
Cover for The strategic importance of email encryption

The strategic importance of email encryption - Securing business data and email traffic throughout its journey

As email is now fully embedded as a business tool and is being used to transfer critical, sensitive data, it is becoming increasingly important to provide a secure, robust and manageable encryption service for email users. Email encryption cannot be…
Back To Top